Information Managment Systems

     

    Part 1, cipher rounds (3 at 3 points each), part 2, multiple choice, 1 point each.
    Suppose we have the plaintext byte: lower case s = 01110011 in ascii binary:
    L1 L2 L3 L4 R1 R2 R3 R4
    PlainText 0 1 1 1 0 0 1 1

    1. Show the next full substitution and transposition round using the information above if the next subkey is 1110:
    L1 L2 L3 L4 R1 R2 R3 R4
    PlainText 0 1 1 1 0 0 1 1
    Subkey
    Apply Round Function to Rbits
    Round Function Result
    XOR with Lbits
    Swap halves

    2. Starting from the last round, do the next full substitution and transposition round if the next subkey is 0001:
    L1 L2 L3 L4 R1 R2 R3 R4
    PlainText
    Subkey
    Apply Round Function to Rbits
    Round Function Result
    XOR with Lbits
    Swap halves

    3. Now, ignoring the previous round, say we are on the 11th round and we have the following plaintext byte in binary:
    L1 L2 L3 L4 R1 R2 R3 R4
    PlainText 0 1 0 1 0 1 1 1

    And if you have the following subkey 1010, complete the round:

    L1 L2 L3 L4 R1 R2 R3 R4
    PlainText
    Subkey
    Apply Round Function to Rbits
    Round Function Result
    XOR with Lbits
    Swap halves

    4. In Windows, what subsystem is responsible for brokering access to objects:
    ___ Object Manager (OM) ___ Security Accounts Manager (SAM)
    ___ Active Directory (AD) ___ Mandatory Access Control Manager (MACM)

    5. X.509 certificates are based on the standard issued by:
    ___ The United States Government ___ International Standards Organization
    ___ Microsoft ___ International Telecommunications Union

    6. A “good” security policy should cover all of the following EXCEPT:
    ___ Correcting Physical Damage ___ Recovering from Human Errors
    ___ Disaster Recovery ___ How to Retaliate

    7. At what layer begins end-to-end security?
    ___ Session ___ Network
    ___ Transport ___ Application

    8. ______________________ are implemented by the network resource manager making a decision about allowing or denying a request to access an object by a user and the security level of the object. In this approach, users are given a security clearance and data are classified with the classification stored in the security labels of the resource.
    ___ A discretionary access control (DAC) ___ Permitted access control (PAL)
    ___ Mandatory access control (MAC) ___ Configured access level (CAL)

    9. A pessimistic security stance:
    ___ Only permits those actions specifically allowed ___ Is the same thing as a blacklist
    ___ Permits actions unless they are explicitly denied ___ Is usually the default setting in router firewalls

     
    ORDER THIS ESSAY HERE NOW AND GET A DISCOUNT !!!

                                                                                                                                      Order Now